First  |  Prev |  Next  |  Last
Pages: 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Adding entropy to windows
Sorry for the simple question and the terminology which I am sure not to get right. Does anyone know the name of the entropy pool use by System.Security.Cryptography.RandomNumberGenerator ? TIA david eather ... 27 May 2010 19:17
Q: PUF
I found an article: http://en.wikipedia.org/wiki/Physically_unclonable_function and have a layman's question: How successful has been that idea in practice, could someone kindly write a few sentences on current major examples of applications? Thanks. M. K. Shen ... 10 Jun 2010 15:41
How Do Decryption Programs Know You've Entered the Wrong Passphrase?
My notion of passphrase-based decryption is that you take the entered passphrase, use some sort of cryptographic hash function to get an AES-256 key, then decrypt with AES-256. (AES-256 is just for the purposes of example--it could be any block cipher.) But what is the standard approach to detect that the wro... 26 May 2010 10:15
R6RS YPSILON source code for an RSA cryptosystem
;************************************************************************** ; ; RSA implementation Grant W Miller (c) Copyright 1996-2009 Grant W Miller ; ; ************************************************************************* ; ; compiles on dual-processor iMac under Ypsilon v0.9, produces ; correct res... 26 May 2010 23:32
How to determine passphrase entropy?
Hi, If we consider a password of n characters, given the user will probably likely enter only alpha characters and numbers and a small set of characters like @#$ etc. how do we calculate the actual entropy of the password? Thanks. ... 27 May 2010 02:45
Just One Good Cipher Will Do.
Given that perfect secrecy of communications or as the “Handbook of Applied Cryptography” puts it, theoretically unbreakable strength of security, is a definitive state, there are can be no degrees of comparison between competing ciphers. Secure means secure – nothing more – nothing less. In passing, the pauci... 27 May 2010 12:37
News: First synthetic cell created
The first synthetic bacterial cell has been created by scientists at the J. Craig Venter Institute, according to a press release of Synthetic Genomics Inc. See: http://www.syntheticgenomics.com/media/press/051910.html What could be the future impact of this colossal breakthrough on crypto? (Factorization etc... 24 May 2010 16:49
Prime Number Fluid model data and graphs
Prime Number Fluid model data and graphs See the WEB site for the paper <A HREF=" http://mister-computer.net/index.htm">WEB Site"</A> -- Regards from RD O'Meara ... 21 May 2010 17:14
AMD Phenom's RSA performance
According to this link http://www.phoronix.com/scan.php?page=article&item=intel_corei3_530&num=6 one can compute some 148 signatures per second using 4096-bit RSA moduli on an AMD Phenom II X3 710 CPU. Is this performance per core, or is it an aggregate of such operation running in parallel on each of the fo... 24 May 2010 06:52
A link to news on help of tapping power of GPU
http://news.ncsu.edu/releases/wmszhoucompiler/ ... 20 May 2010 09:27
First  |  Prev |  Next  |  Last
Pages: 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26